In this article

Risky sign-ins report in the Azure Active Directory portal

11/13/2018

3 minutes to read

Contributors

In this article

Azure Active Directory (Azure AD) detects suspicious actions that are related to your user accounts. For each detected action, a record called a risk event is created. For more details, see Azure AD risk events.

You can access the security reports from the Azure portal by selecting the Azure Active Directory blade and then navigating to the Security section.

There are two different security reports that are calculated based on the risk events:

Risky sign-ins - A risky sign-in is an indicator for a sign-in attempt that might have been performed by someone who is not the legitimate owner of a user account.

Users flagged for risk - A risky user is an indicator for a user account that might have been compromised.

What Azure AD license do you need to access a security report?

All editions of Azure AD provide you with risky sign-ins reports. However, the level of report granularity varies between the editions:

In the Azure Active Directory Free and Basic editions, you get a list of risky sign-ins.

In addition, the Azure Active Directory Premium 1 edition allows you to examine some of the underlying risk events that have been detected for each report.

The Azure Active Directory Premium 2 edition provides you with the most detailed information about all underlying risk events and it also enables you to configure security policies that automatically respond to configured risk levels.

Risky sign-ins report for Azure AD free and basic edition

The Azure AD free and basic editions provide you with a list of risky sign-ins that have been detected for your users. Each record contains the following attributes:

User - The name of the user that was used during the sign-in operation.

IP - The IP address of the device that was used to connect to Azure Active Directory.

Location - The location used to connect to Azure Active Directory. This is a best effort approximation based on traces, registry data, reverse look ups and other information.

Sign-in time - The time when the sign-in was performed

Status - The status of the sign-in

Based on your investigation of the risky sign-in, you can provide feedback to Azure AD by taking the following actions:

Resolve

Mark as false positive

Ignore

Reactivate

This report also provides you with an option to:

Search resources

Download the report data

Risky sign-ins report for Azure AD premium editions

The risky sign-ins report in the Azure AD premium editions provides you with:

Aggregated information about the risk event types that have been detected. With the Azure AD Premium P1 edition, detections that are not covered by your license appear as the risk event Sign-in with additional risk detected. With the Azure AD Premium P2 edition, you get the most detailed information about all underlying detections.

An option to download the report

When you select a risk event, you get a detailed report view for this risk event that enables you to:

Sometimes, you may find a risk event without a corresponding sign-in entry in the sign-ins report. This is because Identity Protection evaluates risk for both interactive and non-interactive sign-ins, whereas the sign-ins report shows only the interactive sign-ins.

When you select a user, you get a detailed report view for this user that enables you to:

Open the All sign-ins view

Reset the user's password

Dismiss all events

Investigate reported risk events for the user.

To investigate a risk event, select one from the list.This opens the Details blade for this risk event. On the Details blade, you have the option to either manually close a risk event or reactivate a manually closed risk event.